Listing 1 - 10 of 1737 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed post-conference proceedings of the 12th EAI International Conference on Mobile Networks and Management, MONAMI 2022, which took place virtually during October 29-31, 2022. The 31 full papers were carefully reviewed and selected from 78 submissions. The papers are divided into groups of content as follows: Innovative Artificial Intelligence Applications for Smart City; The New Era of Computer Network by using Machine Learning; Advanced Technologies in Edge and Fog Computing; Emerging Technologies in Mobile Networks and Management; and Recent Advances in Communications and Computing.
Choose an application
This book constitutes the refereed post-conference proceedings of the 12th EAI International Conference on Mobile Networks and Management, MONAMI 2022, which took place virtually during October 29-31, 2022. The 31 full papers were carefully reviewed and selected from 78 submissions. The papers are divided into groups of content as follows: Innovative Artificial Intelligence Applications for Smart City; The New Era of Computer Network by using Machine Learning; Advanced Technologies in Edge and Fog Computing; Emerging Technologies in Mobile Networks and Management; and Recent Advances in Communications and Computing.
Choose an application
Das Buch gewährt einen Einblick in die Architektur eingebetteter Systeme und den Entwicklungsprozess für die sie steuernde Firmware. Die Anforderungen an ein unbeaufsichtigt laufendes Embedded System sowie deren Umsetzung stehen dabei im Fokus. Alle Konzepte werden anhand von verbreiteten Komponenten wie ARM® Cortex® M3 und M4 basierten Prozessoren, FreeRTOS oder lwip praktisch umgesetzt. Praxistipps zur effizienten und zielgerichteten Nutzung von Debug-, Einkapselungs- und Analysewerkzeugen runden das Buch ab. Sie helfen sowohl dem Einsteiger als auch dem erfahrenen Profi bei der Entwicklung robuster und wartungsfreundlicher Firmware für Mikrocontroller im eingebetteten Umfeld. Der Inhalt Grundlagen ARM® Cortex® M3 und M4 Kerne Betriebssysteme Systemdesign Zeit Synchronisation (Host-) Kommunikation Watchdogs Bootloader Praxistipps Die Zielgruppen Hard- und Softwareentwickler Professional Maker Der Autor Rüdiger R. Asche ist langjähriger freiberuflicher Entwickler von Firmware für Industrial Embedded Controller mit Spezialgebiet Kommunikationsarchitekturen. Zuvor hat er bei der Microsoft Corporation Fachartikel für die MSDN Plattform über Windows® Systemkomponenten verfasst und Systemsoftware für PC Systeme entwickelt.
Choose an application
This book teaches IT service managers how to onboard ServiceNow ITSM tools by evangelizing, educating, and coordinating their organization's service desk, developers, and stakeholders. Drawing on his own story of lessons learned in spinning up the adoption of ServiceNow throughout the Al Jazeera Media Network, application architect Gabriele Kahlout shows IT service managers how to launch automated ServiceNow ticketing tools in seamless integration with their organization's existing email and Active Directory. Spinning Up ServiceNow: IT Service Managers Guide to Successful User Adoption shows IT service managers how to orchestrate their IT service desks and developers to facilitate the adoption and consumption of IT services by all users, supporting their various business needs while optimizing human-computer interaction and minimizing stress and productivity loss arising from poor human-system design. What you will learn: How to quick-start ServiceNow in a matter of days with the minimum configuration required to start processing tickets via email How to avoid the teething problems that can spoil your users’ onboarding experience with ServiceNow How to automate the process of scaling up new teams into ServiceNow How to shape your users' experiences so that they retain their familiar bearings in email and Active Directory while welcoming the power of ServiceNow enhancements How to create a strategy to avoid common pitfalls that sabotage ITSM programs.
Choose an application
This book constitutes the proceedings of the International Workshop on Shape in Medical Imaging, ShapeMI 2024, which took place in Marrakesh, Morocco, on October 6, 2024, held in conjunction with MICCAI 2024. The 16 full papers included in this book were carefully reviewed and selected from 24 submissions. They focus on shape and spectral analysis, geometric learning and modeling algorithms, and application-driven research.
Choose an application
Real-time computer systems are very often subject to dependability requirements because of their application areas. Fly-by-wire airplane control systems, control of power plants, industrial process control systems and others are required to continue their function despite faults. Fault-tolerance and real-time requirements thus constitute a kind of natural combination in process control applications. Systematic fault-tolerance is based on redundancy, which is used to mask failures of individual components. The problem of replica determinism is thereby to ensure that replicated components show consistent behavior in the absence of faults. It might seem trivial that, given an identical sequence of inputs, replicated computer systems will produce consistent outputs. Unfortunately, this is not the case. The problem of replica non-determinism and the presentation of its possible solutions is the subject of Fault-Tolerant Real-Time Systems: The Problem of Replica Determinism. The field of automotive electronics is an important application area of fault-tolerant real-time systems. Systems like anti-lock braking, engine control, active suspension or vehicle dynamics control have demanding real-time and fault-tolerance requirements. These requirements have to be met even in the presence of very limited resources since cost is extremely important. Because of its interesting properties Fault-Tolerant Real-Time Systems gives an introduction to the application area of automotive electronics. The requirements of automotive electronics are a topic of discussion in the remainder of this work and are used as a benchmark to evaluate solutions to the problem of replica determinism.
Choose an application
It is always a special honor to chair the European Dependable Computing C- ference (EDCC). EDCC has become one of the well-established conferences in the ?eld of dependability in the European research area. Budapest was selected as the host of this conference due to its traditions in organizing international scienti?c events and its traditional role of serving as a meeting point between East and West. EDCC-5 was the ?fth in the series of these high-quality scienti?c conf- ences. In addition to the overall signi?cance of such a pan-European event, this year's conference was a special one due to historic reasons. The roots of EDCC date back to the moment when the Iron Curtain fell. Originally, two groups of scientists from di?erent European countries in Western and Eastern Europe - who were active in research and education related to dependability created a - joint forum in order to merge their communities as early as in 1989. This trend has continued up to today. This year's conference was the ?rst one where the overwhelming majority of the research groups belong to the family of European nations united in the European Union. During the past 16 years we observed that the same roots in all the professional, cultural and scienti?c senses led to a seamless integration of these research communities previously separated ar- ?cially for a long time. EDCC has become one of the main European platforms to exchange new - searchideasinthe?eldofdependability.
Choose an application
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the key issues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.
Choose an application
This volume comprises the proceedings of the International Workshop, ShapeMI 2023, which took place alongside MICCAI 2023 on October 8, 2023, in Vancouver, British Columbia, Canada. The 23 selected full papers deal with all aspects of leading methods and applications for advanced shape analysis and geometric learning in medical imaging.
Diagnostic imaging --- Data processing --- Computer vision. --- Machine learning. --- Computers, Special purpose. --- Computer Vision. --- Machine Learning. --- Special Purpose and Application-Based Systems.
Choose an application
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the key issues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.
Listing 1 - 10 of 1737 | << page >> |
Sort by
|